International audienceSuppose that the private key of discrete logarithm-based or factoring-based public-key primitive is obtained by concatenating the outputs of a linear congruential generator. How seriously is the scheme weakened as a result? While linear congruential generators are cryptographically very weak "pseudorandom" number generators, the answer to that question is not immediately obvious, since an adversary in such a setting does not get to examine the outputs of the congruential generator directly, but can only obtain an implicit hint about them—namely the public key. In this paper, we take a closer look at that problem, and show that, in most cases, an attack does exist to retrieve the key much faster than with a naive exhaus...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm ...
We study the security of a block cipher-based pseudorandom number generator (PRNG), both in the blac...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
We study the security of a block cipher-based pseudorandom number generator (PRNG), both in the blac...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
Abstract. We study the security of a block cipher-based pseudorandom number generator, both in the b...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
International audienceSuppose that the private key of discrete logarithm-based or factoring-based pu...
Abstract. Suppose that the private key of discrete logarithm-based or factoring-based public-key pri...
The DSS signature algorithm requires the signer to generate a new random number with every signature...
Pseudorandom Number Generators are deterministic algorithms which take in a value obtained from an e...
We describe a novel type of weak cryptographic private key that can exist in any discrete logarithm ...
We study the security of a block cipher-based pseudorandom number generator (PRNG), both in the blac...
International audienceWe revisit the problem of proving that a user algorithm se-lected and correctl...
We study the security of a block cipher-based pseudorandom number generator (PRNG), both in the blac...
We provide a formal treatment of backdoored pseudorandom generators (PRGs). Here a saboteur chooses ...
We try to provide an alternative attitude toward the use of a Linear Congruential Generator (LCG her...
Abstract. We study the security of a block cipher-based pseudorandom number generator, both in the b...
International audienceA pseudo-random number generator (PRNG) is a deterministic algorithm that prod...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...
In this article, we discuss a naive method of randomness reduction for cryptographic schemes, which ...
Pseudorandom Generators (PRGs) based on the RSA inversion (one-wayness) problem have been extensivel...